
Introduction
Chapter I - Equipment for Cipher Work
Chapter II - Principles of Mechanism of a Written Language
Chapter III - Technique of Cipher Examination
Chapter IV - Classes of Ciphers
Chapter V - Examination of Transposition Ciphers
Chapter VI - Examination of Substitution Ciphers
Chapter VII
Chapter VIII
Chapter IX - Other Substitution Methods
War has always turned on the ability to keep plans hidden, and this guide explains why plain‑language dispatches have repeatedly led to disaster. It walks listeners through the evolution of battlefield secrecy, from intercepted letters to modern radio and telegraph eavesdropping, showing how every link in the communication chain can become vulnerable. By framing the problem in real‑world terms, the introduction makes the stakes of cryptographic failure vivid and immediate.
The core of the manual offers a clear set of practical criteria for any military cipher, emphasizing speed, portability, and resilience even when the system falls into enemy hands. Drawing on hundreds of historic messages—many of which were cracked quickly—the author illustrates common weaknesses and demonstrates how even modest tools can buy crucial time. Listeners will come away with a solid grasp of what makes a cipher useful in the field and why many traditional methods fall short.
Language
en
Duration
~2 hours (148K characters)
Publisher of text edition
Project Gutenberg
Credits
Produced by Jeroen Hellingman and the Online Distributed Proofreading Team at http://www.pgdp.net/ for Project Gutenberg (This file was produced from images generously made available by The Internet Archive/American Libraries.)
Release date
2015-05-04
Rights
Public domain in the USA.
Subjects
b. 1878
Best remembered as a pioneering Army cryptographer, he wrote practical guides that helped shape early U.S. military code and cipher work. His books reflect a career spent turning battlefield communication into a more disciplined science.
View all books